Fact : Linux and Windows both are equally insecure or secure. Year : 2017 Said by : IT head of a mid-size bank “We run…
Cyber Security Myth Debunked – Its Only In Hollywood Movies
Fact : Cyber Security is a reality and not a hoax. Year : 2015 Said by : IT Head of a Manufacturing company trying to…
Web VAPT Tools Comparison
WEB VAPT TOOLS COMPARISON Web Application VAPT is security testing methods for security holes or vulnerabilities in web applications and corporate websites. Due to these…
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety experts on the user’s network for identifying possible vulnerabilities that…
Patch management tricks and techniques
I. What is a patch? In technical terms, “Patch” are the changes performed on a computer program/software to enhance its security shield against newly rising…
Why HIPAA and GDPR cannot replace each other
Why HIPAA and GDPR cannot replace each other? Its a misconception that GDPR and HIPAA can replace each other. Many companies misconstrue both the compliances….
Is that mobile app safe to use?
Would you readily give your residential address to a stranger? No? Aren’t you extra cautious while opening an email from an unknown sender? Yes? Good!…
Cyber Security Webinar – Working From Home – For Senior Management
Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – this video has an audio track.
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video…
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes…